IP Multicast Optimization: SSM Channel Based Filtering for Multicast
Prerequisites for SSM Channel Based Filtering for Multicast Boundaries
IP multicast is enabled on the device using the tasks described in the "Configuring Basic IP Multicast" module of the
IP Multicast: PIM Configuration Guide.
Information About the SSM Channel Based Filtering for Multicast Boundaries Feature
Rules for Multicast Boundaries
The SSM Channel Based Filtering for Multicast Boundaries feature expands the
ipmulticastboundary command for control plane filtering support. More than one
ipmulticastboundary command can be applied to an interface.
The following rules govern the
One instance of the
out keywords can be configured on an interface.
out keywords can be used for standard or extended access lists.
Only standard access lists are permitted with the use of the
filter-autorp keyword or no keyword.
A maximum of three instances of a command will be allowed on an interface: one instance of
in, one instance of
out, and one instance of
filter-autorp or no keyword.
When multiple instances of the command are used, the filtering will be cumulative. If a boundary statement with no keyword
exists with a boundary statement with the
inkeyword, both access lists will be applied on the in direction and a match on either one will be sufficient.
All instances of the command apply to both control and data plane traffic.
Protocol information on the extended access list is parsed to allow reuse and filtering for consistency. An (S,G) operation
will be filtered by an extended access list under all conditions stated above for keywords if the access list filters (S,G)
traffic for all protocols.
Benefits of SSM Channel Based Filtering for Multicast Boundaries
This feature allows input on the source interface.
The access control capabilities are the same for SSM and Any Source Multicast (ASM).
How to Configure SSM Channel Based Filtering for Multicast Boundaries
Configuring Multicast Boundaries
Command or Action
Enables privileged EXEC mode.
Device# configure terminal
Enters global configuration mode.
Device(config)# ip access-list 101
Configures the standard or extended access list.
Device(config-ext-nacl)# permit ip host 184.108.40.206 host 220.127.116.11
Permits specified ip host traffic.
Device(config-acl-nacl)# deny ip host 18.104.22.168 host 22.214.171.124
Denies specified multicast ip group and source traffic.
Repeat Step 4 or Step 5 as needed.
Permits and denies specified host and source traffic.
The Cisco Support and Documentation website provides online resources to download documentation, software, and tools. Use
these resources to install and configure the software and to troubleshoot and resolve technical issues with Cisco products
and technologies. Access to most tools on the Cisco Support and Documentation website requires a Cisco.com user ID and password.